Sciweavers

72 search results - page 10 / 15
» Making policy decisions disappear into the user's workflow
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
GLOBECOM
2010
IEEE
13 years 5 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
ATAL
2003
Springer
14 years 26 days ago
Adjustable Autonomy Challenges in Personal Assistant Agents: A Position Paper
The successful integration and acceptance of many multi-agent systems into daily lives crucially depends on the ability to develop effective policies for adjustable autonomy. Adju...
Rajiv T. Maheswaran, Milind Tambe, Pradeep Varakan...
HICSS
2008
IEEE
164views Biometrics» more  HICSS 2008»
14 years 2 months ago
Scaling Consensus: Increasing Decentralization in Wikipedia Governance
How does “self-governance” happen in Wikipedia? Through in-depth interviews with eleven individuals who have held a variety of responsibilities in the English Wikipedia, we ob...
Andrea Forte, Amy Bruckman
COLCOM
2007
IEEE
14 years 1 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...